000464471 000__ 01073cam\a2200325Ia\4500 000464471 001__ 464471 000464471 005__ 20210513162456.0 000464471 006__ m\\\\\\\\d\\\\\\\\ 000464471 007__ cr\cn||||||||| 000464471 008__ 120511s2012\\\\idua\\\\o\\\\\001\0\eng\d 000464471 020__ $$z9781583473733 000464471 020__ $$z9781583477038 000464471 035__ $$a(CaPaEBR)ebr10555718 000464471 035__ $$a(OCoLC)794492343 000464471 040__ $$aCaPaEBR$$cCaPaEBR 000464471 05014 $$aQA76.9.A25$$bW66 2012eb 000464471 1001_ $$aWoodbury, Carol. 000464471 24510 $$aIBM i security administration and compliance$$h[electronic resource] /$$cby Carol Woodbury. 000464471 250__ $$a1st ed. 000464471 260__ $$aKetchum, ID :$$bMC Press,$$c2012. 000464471 300__ $$axv, 352 p. :$$bill. 000464471 500__ $$aIncludes index. 000464471 506__ $$aAccess limited to authorized users. 000464471 63000 $$ai5/OS. 000464471 650_0 $$aComputer security. 000464471 650_0 $$aIBM computers$$xProgramming. 000464471 655_7 $$aElectronic books.$$2lcsh 000464471 852__ $$bebk 000464471 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=10555718$$zOnline Access 000464471 909CO $$ooai:library.usi.edu:464471$$pGLOBAL_SET 000464471 980__ $$aEBOOK 000464471 980__ $$aBIB 000464471 982__ $$aEbook 000464471 983__ $$aOnline